发明名称 Restricting network and device access based on presence detection
摘要 In an example embodiment, a technique that applies a network policy responsive to specified events, or triggers, to a networked device. If a specified event occurs, the network policy may restrict the device's access to the network. For example, if a user walks away from their networked device, such as a laptop, the device's network access changes. For example, depending upon the policy, network traffic may be blocked or otherwise restricted.
申请公布号 US9336356(B2) 申请公布日期 2016.05.10
申请号 US201113267508 申请日期 2011.10.06
申请人 CISCO TECHNOLOGY, INC. 发明人 Parla Vincent E.;Gelasco Eli John;Tillotson Paul Michael
分类号 H04L29/06;G06F21/00;H04W12/08 主分类号 H04L29/06
代理机构 Patterson + Sheridan 代理人 Patterson + Sheridan
主权项 1. An apparatus, comprising: an interface for communicating with an associated network; and a controller coupled with the interface; wherein the controller obtains data representative of a location of the apparatus;wherein the controller obtains data representative of a location of a user associated device, wherein the location of the user associated device comprises one of a geographical location and a network location;wherein the controller determines a first proximity of the apparatus with the user associated device;wherein the controller obtains data representative of a predefined trigger event, the predefined trigger event comprising the first proximity of the apparatus with the user associated device exceeding a predetermined threshold;wherein the controller selects a network policy in accordance with the location of the apparatus;wherein the controller, in response to the predefined trigger event, applies the selected network policy to restrict communication with the associated network via the interface;wherein the controller obtains data representative of a plurality of release triggers, the plurality of release triggers comprising a first release trigger responsive to the user associated device returning to within a predefined proximity of the apparatus, and a second release trigger comprising the controller receiving a predefined response to a secondary challenge issued by the controller; andwherein the controller applies a network restoration policy responsive to obtaining the data representative of the plurality of release triggers and wherein network restoration policy restores access to the associated network via the interface.
地址 San Jose CA US